共 9 条
[1]
Amin S, 2009, LECT NOTES COMPUT SC, V5469, P31, DOI 10.1007/978-3-642-00602-9_3
[2]
[Anonymous], P 16 ACM C COMP COMM
[3]
Cardenas Alvaro A., 2008, 2008 28th International Conference on Distributed Computing Systems Workshops (ICDCS Workshops), P495, DOI 10.1109/ICDCS.Workshops.2008.40
[4]
False Data Injection Attacks against State Estimation in Wireless Sensor Networks
[J].
49TH IEEE CONFERENCE ON DECISION AND CONTROL (CDC),
2010,
:5967-5972
[5]
Secure Control Against Replay Attacks
[J].
2009 47TH ANNUAL ALLERTON CONFERENCE ON COMMUNICATION, CONTROL, AND COMPUTING, VOLS 1 AND 2,
2009,
:911-918
[6]
Pasqualetti F., 2010, IEEE T AUTO IN PRESS
[7]
Sandberg H., 2010, 1 WORKSH SEC CONTR S, P1
[8]
Sundaram S., 2010, IEEE C DEC CONTR ATL
[9]
Xie L, 2010, INT CONF SMART GRID, P226, DOI 10.1109/SMARTGRID.2010.5622048